mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
* Add protobuf config and generated code, and client wrapper * wire up loading of secretsmanager plugin, using renderer plugin as a model * update kvstore provider to check if we should use the grpc plugin. return false always in OSS * add OSS remote plugin check * refactor wire gen file * log which secrets manager is being used * Fix argument types for remote checker * Turns out if err != nil, then the result is always nil. Return empty values if there is an error. * remove duplicate import * Update pkg/services/secrets/kvstore/kvstore.go Co-authored-by: Marcus Efraimsson <marcus.efraimsson@gmail.com> * Update pkg/services/secrets/kvstore/kvstore.go Co-authored-by: Marcus Efraimsson <marcus.efraimsson@gmail.com> * refactor RemotePluginCheck interface to just return the Plugin client directly * rename struct to something less silly * Update pkg/plugins/backendplugin/secretsmanagerplugin/secretsmanager.proto Co-authored-by: Will Browne <wbrowne@users.noreply.github.com> Co-authored-by: Marcus Efraimsson <marcus.efraimsson@gmail.com> Co-authored-by: Will Browne <wbrowne@users.noreply.github.com>
126 lines
3.0 KiB
Go
126 lines
3.0 KiB
Go
package kvstore
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/grafana/grafana/pkg/infra/log"
|
|
smp "github.com/grafana/grafana/pkg/plugins/backendplugin/secretsmanagerplugin"
|
|
"github.com/grafana/grafana/pkg/services/secrets"
|
|
)
|
|
|
|
// secretsKVStorePlugin provides a key/value store backed by the Grafana plugin gRPC interface
|
|
type secretsKVStorePlugin struct {
|
|
log log.Logger
|
|
secretsPlugin smp.SecretsManagerPlugin
|
|
secretsService secrets.Service
|
|
}
|
|
|
|
// Get an item from the store
|
|
func (kv *secretsKVStorePlugin) Get(ctx context.Context, orgId int64, namespace string, typ string) (string, bool, error) {
|
|
req := &smp.SecretsGetRequest{
|
|
KeyDescriptor: &smp.Key{
|
|
OrgId: orgId,
|
|
Namespace: namespace,
|
|
Type: typ,
|
|
},
|
|
}
|
|
res, err := kv.secretsPlugin.Get(ctx, req)
|
|
if err != nil {
|
|
return "", false, err
|
|
} else if res.Error != "" {
|
|
err = fmt.Errorf(res.Error)
|
|
}
|
|
|
|
return res.DecryptedValue, res.Exists, err
|
|
}
|
|
|
|
// Set an item in the store
|
|
func (kv *secretsKVStorePlugin) Set(ctx context.Context, orgId int64, namespace string, typ string, value string) error {
|
|
req := &smp.SecretsSetRequest{
|
|
KeyDescriptor: &smp.Key{
|
|
OrgId: orgId,
|
|
Namespace: namespace,
|
|
Type: typ,
|
|
},
|
|
Value: value,
|
|
}
|
|
|
|
res, err := kv.secretsPlugin.Set(ctx, req)
|
|
if err == nil && res.Error != "" {
|
|
err = fmt.Errorf(res.Error)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// Del deletes an item from the store.
|
|
func (kv *secretsKVStorePlugin) Del(ctx context.Context, orgId int64, namespace string, typ string) error {
|
|
req := &smp.SecretsDelRequest{
|
|
KeyDescriptor: &smp.Key{
|
|
OrgId: orgId,
|
|
Namespace: namespace,
|
|
Type: typ,
|
|
},
|
|
}
|
|
|
|
res, err := kv.secretsPlugin.Del(ctx, req)
|
|
if err == nil && res.Error != "" {
|
|
err = fmt.Errorf(res.Error)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// Keys get all keys for a given namespace. To query for all
|
|
// organizations the constant 'kvstore.AllOrganizations' can be passed as orgId.
|
|
func (kv *secretsKVStorePlugin) Keys(ctx context.Context, orgId int64, namespace string, typ string) ([]Key, error) {
|
|
req := &smp.SecretsKeysRequest{
|
|
KeyDescriptor: &smp.Key{
|
|
OrgId: orgId,
|
|
Namespace: namespace,
|
|
Type: typ,
|
|
},
|
|
AllOrganizations: orgId == AllOrganizations,
|
|
}
|
|
|
|
res, err := kv.secretsPlugin.Keys(ctx, req)
|
|
if err != nil {
|
|
return nil, err
|
|
} else if res.Error != "" {
|
|
err = fmt.Errorf(res.Error)
|
|
}
|
|
|
|
return parseKeys(res.Keys), err
|
|
}
|
|
|
|
// Rename an item in the store
|
|
func (kv *secretsKVStorePlugin) Rename(ctx context.Context, orgId int64, namespace string, typ string, newNamespace string) error {
|
|
req := &smp.SecretsRenameRequest{
|
|
KeyDescriptor: &smp.Key{
|
|
OrgId: orgId,
|
|
Namespace: namespace,
|
|
Type: typ,
|
|
},
|
|
NewNamespace: newNamespace,
|
|
}
|
|
|
|
res, err := kv.secretsPlugin.Rename(ctx, req)
|
|
if err == nil && res.Error != "" {
|
|
err = fmt.Errorf(res.Error)
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
func parseKeys(keys []*smp.Key) []Key {
|
|
var newKeys []Key
|
|
|
|
for _, k := range keys {
|
|
newKey := Key{OrgId: k.OrgId, Namespace: k.Namespace, Type: k.Type}
|
|
newKeys = append(newKeys, newKey)
|
|
}
|
|
|
|
return newKeys
|
|
}
|